Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Databricks on GCP data exfiltration protection workspace deployment #172

Open
wants to merge 8 commits into
base: main
Choose a base branch
from

Conversation

micheledaddetta-databricks
Copy link
Collaborator

The module still uses the CMv2 architecture. When the CMv1 architecture will be released and supported by Terraform provider, the implementation will be reviewed

The commit contains the implementation for the workspace resource group. However this change requires to no more use the local.rg_location variable, since the value is known after the apply, and rhis force the replacement of all of the resources
Most of README files were already defined. TFDocs updated in each of them
@alexott
Copy link
Collaborator

alexott commented Feb 18, 2025

@bhavink - wdyt?

@bhavink
Copy link

bhavink commented Feb 19, 2025

@alexott I do not think on GCP we need traditional hub/spoke based arch. Shared vpc based deployment is a common and popular arch where one could use vpc f/w rules along with vpc sc to prevent data exfiltration. TF support for CMv1 will be available by early March 2025 so may I suggest that we wait for it to be released and then update the GCP specific module?

@alexott
Copy link
Collaborator

alexott commented Feb 19, 2025

I agree about waiting for CMv1 migration

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants